Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e12a0ed92ae0f98e-d562afd2-47a14c8a-bafba83b-4b41735a898aca618b48a7ec"><ac:parameter ac:name="">Abadi 96</ac:parameter></ac:structured-macro> \[Abadi 1996\] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. _IEEE Transactions on Software Engineering_ 22(1):6â15 (1996). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="79976cab7ec2ea2b-fdffda81-40db4ba0-86afb684-a1bfba2f06c0a41fe532b811"><ac:parameter ac:name="">API 06</ac:parameter></ac:structured-macro> \[API 2006\] [Java Platform, Standard Edition 6 API Specification|http://docs.oracle.com/javase/6/docs/api/]. Oracle, Inc. (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6284e9d6a5b3d21a-06b9f7f5-49ad4c67-96f3903a-2ee8c2e629c935ba694d41ad"><ac:parameter ac:name="">API 11</ac:parameter></ac:structured-macro> \[API 2011\] [Java Platform, Standard Edition 7 API Specification|http://download.oracle.com/javase/7/docs/api/index.html]. Oracle, Inc. (2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e7b535e067a1bb76-1950fd41-40e442de-bffaa8ae-3151ce3bbba1bbb741c76116"><ac:parameter ac:name="">Austin 00</ac:parameter></ac:structured-macro> \[Austin 2000\] Austin, Calvin, and Monica Pawlan. [_Advanced Programming for the Java 2 Platform_|http://java.sun.com/developer/onlineTraining/Programming/JDCBook/index.html#contents]. Boston: Addison-Wesley Longman (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8caf8e11b625b418-c7a4caea-41494e92-8a71b35f-e2c2ed654dc661b021609d68"><ac:parameter ac:name="">Black 04</ac:parameter></ac:structured-macro> \[Black 2004\] Black, Paul E., and Paul J. Tanenbaum. "partial order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/partialorder.html] (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0925e5fe0fdd8df9-8b360c0e-4f164196-8c84b924-ad383cd259a7cb9d904d535f"><ac:parameter ac:name="">Black 06</ac:parameter></ac:structured-macro> \[Black 2006\] Black, Paul E., and Paul J. Tanenbaum. "total order." In _Dictionary of Algorithms and Data Structures_ \[online\], Paul E. Black, ed., U.S. National Institute of Standards and Technology. [http://xlinux.nist.gov/dads/HTML/totalorder.html] (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33b0955aa0cae107-343d3405-4dce4b8a-a74197e3-92dc0f558b7405f795095127"><ac:parameter ac:name="">Bloch 01</ac:parameter></ac:structured-macro> \[Bloch 2001\] Bloch, Joshua. _Effective Java: Programming Language Guide_. Boston: Addison-Wesley (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d61a97c4a1bdca47-3d04a0c5-4f7f4b36-a051bdc4-843affa50616f13a0b61496e"><ac:parameter ac:name="">Bloch 05</ac:parameter></ac:structured-macro> \[Bloch 2005\] Bloch, Joshua, and Neal Gafter. _Java Puzzlers: Traps, Pitfalls, and Corner Cases_. Upper Saddle River, NJ: Addison-Wesley (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4f586dc99b8012ff-1b27d089-4a4a4a50-8cf9885d-10ab92128e0e114d9fe735fb"><ac:parameter ac:name="">Bloch 05b</ac:parameter></ac:structured-macro> \[Bloch 2005b\] Bloch, Joshua, and Neal Gafter. [Yet More Programming Puzzlers|http://gceclub.sun.com.cn/java_one_online/2005/TS-3738/]. JavaOne Conference (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dbd5b8a9b3a42996-6a963e31-40fc469c-add0bafd-7bc020ae45e49af19e1c8f3d"><ac:parameter ac:name="">Bloch 07</ac:parameter></ac:structured-macro> \[Bloch 2007\] Bloch, Joshua. [Effective Java⢠Reloaded: This Time It's (Not) for Real|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2689.pdf]. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fc3e86a0b1ffc457-7e4149a4-422c4499-aea89c12-5479f8453cf97bf5a1411c05"><ac:parameter ac:name="">Bloch 08</ac:parameter></ac:structured-macro> \[Bloch 2008\] Bloch, Joshua. _Effective Java_, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfb1cfa2ff5c08e2-15bc6a75-4cb94e89-849ba1c4-c729ce923b794548fe684f2d"><ac:parameter ac:name="">Bloch 09</ac:parameter></ac:structured-macro> \[Bloch 2009\] Bloch, Joshua, and Neal Gafter. [Return of the Puzzlers: Schlock and Awe|http://www.oracle.com/technetwork/server-storage/ts-5186-159197.pdf]. JavaOne Conference (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="eae4a306473ff061-8ca54c4b-43c14a70-810c97ba-de1640e9b4c0615372d4cf29"><ac:parameter ac:name="">Boehm 05</ac:parameter></ac:structured-macro> \[Boehm 2005\] Boehm, Hans-J. Finalization, Threads, and the Java⢠Technology-Based Memory Model. JavaOne Conference (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bb300e7e5e5866cd-6bb0e1aa-4ff64481-847c9509-8ace0c7a9192c22d694d3150"><ac:parameter ac:name="">Campione 96</ac:parameter></ac:structured-macro> \[Campione 1996\] Campione, Mary, and Kathy Walrath. _The Java Tutorial: Object-Oriented Programming for the Internet_. Reading, MA: Addison-Wesley (1996). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3c22643d8c71b6cf-2773d7cb-48254e56-95458cd5-a138576faf20b5ae9bbc33d8"><ac:parameter ac:name="">CCITT 88</ac:parameter></ac:structured-macro> \[CCITT 1988\] CCITT (International Telegraph and Telephone Consultative Committee). _CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework_. Geneva: International Telecommunication Union (1988). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="87fa5cd0adfc6e02-d5d51183-46f94f0e-87e68247-5aea9b3c313b94e846e674d0"><ac:parameter ac:name="">Chan 99</ac:parameter></ac:structured-macro> \[Chan 1999\] Chan, Patrick, Rosanna Lee, and Douglas Kramer. _The Java Class Libraries: Supplement for the Java 2 Platform, v1.2_, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b8d4db92246b09a3-5ee73861-42af4832-8ad69b22-301dc330713b272bec18d21b"><ac:parameter ac:name="">Chess 07</ac:parameter></ac:structured-macro> \[Chess 2007\] Chess, Brian, and Jacob West. _Secure Programming with Static Analysis_. Upper Saddle River, NJ: Addison-Wesley Professional (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b3065d1320b2e140-27128656-4f6d4fe6-96d88427-e2d66baca97b959da59af6d0"><ac:parameter ac:name="">Christudas 05</ac:parameter></ac:structured-macro> \[Christudas 2005\] Christudas, Binildas. [Internals of Java Class Loading|http://www.onjava.com/pub/a/onjava/2005/01/26/classloading.html], _ONJava_ (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="69951b80fdb298ce-3e449c18-463e4768-9559a6c2-2460e9504158b42cae7797c1"><ac:parameter ac:name="">Cohen 81</ac:parameter></ac:structured-macro> \[Cohen 1981\] Cohen, D. [On Holy Wars and a Plea for Peace|http://dx.doi.org/10.1109/C-M.1981.220208], _IEEE Computer_, 14(10):48â54 (1981). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a6eb216d12df1d1-6410d9f0-4fbd4f54-abe59e92-2988b80effed5f18cafa4db6"><ac:parameter ac:name="">Conventions 09</ac:parameter></ac:structured-macro> \[Conventions 2009\] [Code Conventions for the Java Programming Language|http://www.oracle.com/technetwork/java/codeconv-138413.html]. Oracle, Inc. (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4604c1227c7e1d84-adeb1eec-4e594cad-ad5c928f-a3818811064666b26cc11fc1"><ac:parameter ac:name="">Coomes 07</ac:parameter></ac:structured-macro> \[Coomes 2007\] Coomes, John, Peter Kessler, and Tony Printezis. [Garbage Collection-Friendly Programming|http://docs.huihoo.com/javaone/2007/java-se/TS-2906.pdf]. Java SE Garbage Collection Group, Sun Microsystems, Inc. JavaOne Conference (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9d6148192c15ba17-745c3c84-41bf4f2b-87f8ad3c-891fd392f4cc0eae8734066c"><ac:parameter ac:name="">Core Java 04</ac:parameter></ac:structured-macro> \[Core Java 2004\] Horstmann, Cay S., and Gary Cornell. _Core Java⢠2, Vol. I: Fundamentals_, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5c3a24169a18c50-81f0901c-40d44ccd-9fb89dd9-9cd52dbef20cf904bb6252de"><ac:parameter ac:name="">Cunningham 95</ac:parameter></ac:structured-macro> \[Cunningham 1995\] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In _Pattern Languages of Program Design_, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b9b9f75adb3a0487-350147b3-4ca5454e-acbfb772-fb393eb25d3a0d7a80f3c759"><ac:parameter ac:name="">CVE 08</ac:parameter></ac:structured-macro> \[CVE 2008\] MITRE Corporation. \[Common Vulnerabilities and Exposures|http://cve.mitre.org/index.html] (2008/2012). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8246d748698dd03a-89f77642-42824cfc-87b4b6e9-9864a589a731ab4be27a651e"><ac:parameter ac:name="">Daconta 00</ac:parameter></ac:structured-macro> \[Daconta 2000\] Daconta, Michael C. [When Runtime.exec() Won't|http://www.javaworld.com/javaworld/jw-12-2000/jw-1229-traps.html]. _JavaWorld.com_ (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ec1250b44acc0b30-833b7fdc-4ed54b7b-b7d1ba15-81b0b3fe539f4162c04a8c67"><ac:parameter ac:name="">Daconta 03</ac:parameter></ac:structured-macro> \[Daconta 2003\] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. _More Java Pitfalls_. Indianapolis: Wiley (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e1f7717e50542728-7e7003bd-43af4f25-b3218631-39b50e1644e257ac752e75fa"><ac:parameter ac:name="">Darwin 04</ac:parameter></ac:structured-macro> \[Darwin 2004\] Darwin, Ian F. _Java Cookbook_, 2nd ed. Sebastopol, CA: OâReilly (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5791ef30c727daf7-bfdd14e2-4ec34864-beb19507-f972f3ff8762f75541789cc1"><ac:parameter ac:name="">Davis 08</ac:parameter></ac:structured-macro> \[Davis 2008\] Davis, Mark, and Martin Dürst. [Unicode Standard Annex #15: Unicode Normalization Forms|http://unicode.org/reports/tr15/] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b28e72359e68f4bc-a393c6f9-43154754-95fb8513-bbddda44197107b2fe763527"><ac:parameter ac:name="">Davis 08b</ac:parameter></ac:structured-macro> \[Davis 2008b\] Davis, Mark, and Michel Suignard. [Unicode Technical Report #36, Unicode Security Considerations|http://www.unicode.org/reports/tr36/] (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2e9cf26a811d1280-fd5561aa-441d447a-a69d875f-b0f277a64b02d1216bcdf45e"><ac:parameter ac:name="">Dennis 1966</ac:parameter></ac:structured-macro> \[Dennis 1966\] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. _Communications of the ACM_, 9(3):143â155 (1966). doi: 10.1145/365230.365252. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fb953ac3bd1e5eb0-9d15c287-4b9c49ff-a4878f8e-78ab7a857c3a3b425b0e3f8c"><ac:parameter ac:name="">DHS 06</ac:parameter></ac:structured-macro> \[DHS 2006\] U.S. Department of Homeland Security. [Build Security In|https://buildsecurityin.us-cert.gov/]. https://buildsecurityin.us-cert.gov (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9f245ed6e96139ab-b3043221-47f8459a-b7f08995-9d2819bb3bfdd59885f83c26"><ac:parameter ac:name="">Dormann 08</ac:parameter></ac:structured-macro> \[Dormann 2008\] Dormann, Will. [Signed Java Applet Security: Worse Than ActiveX?|http://www.cert.org/blo gs/vuls/2008/06/signed_java_security_worse_tha.html] CERT Vulnerability Analysis Blog (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef6f81a304aa24b8-2b6168be-4ad94af8-b096b167-20abb0e77a5d2388081fa330"><ac:parameter ac:name="">Doshi 03</ac:parameter></ac:structured-macro> \[Doshi 2003\] Doshi, Gunjan. [Best Practices for Exception Handling|http://www.onjava.com/pub/a/onjava/2003/11/19/exceptions.html]. _ONJava_ (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a3ffe8aa2d1f7d3f-9fb975df-40504cd1-8b7fbe0a-48f479432bdd44b966de066c"><ac:parameter ac:name="">Dougherty 2009</ac:parameter></ac:structured-macro> \[Dougherty 2009\] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. [Secure Design Patterns|http://www.sei.cmu.edu/library/abstracts/reports/09tr010.cfm]. CMU/SEI-2009-TR-010 (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63c0bbfe414fdbf1-92e443d0-43724177-bf66aae3-86409aca2e5e5c6f7937d6b5"><ac:parameter ac:name="">Eclipse 08</ac:parameter></ac:structured-macro> \[Eclipse 2008\] [The Eclipse Platform|http://www.eclipse.org/platform/], The Eclipse Foundation (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1d6ef93b485a737b-6a7c1abb-42e54113-93d38b92-51af8cda91b74f462e8065eb"><ac:parameter ac:name="">Encodings 06</ac:parameter></ac:structured-macro> \[Encodings 2006\] [Supported Encodings|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/intl/encoding.doc.html], Sun MicrosystemsOracle, Inc. (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46c4697fddadbe61-d43ec307-42914bf8-abb190ec-e30bb2396136ba33275f42fb"><ac:parameter ac:name="">Enterprise 03</ac:parameter></ac:structured-macro> \[Enterprise 2003\] Eckstein, Robert. _Java Enterprise Best Practices, by the O'Reilly Java Authors._. Sebastopol, CA: O'Reilly. (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c7963288898c1dce-af321843-4edb4924-9a9a8ace-dfb70514e59d247bf6b81686"><ac:parameter ac:name="">ESA 05</ac:parameter></ac:structured-macro> \[ESA 2005\] ESA (European Space Agency). [Java Coding Standards|ftphttp://ftpsoftware.estecucv.esa.nlro/pub~eganea/wm/wme/bssc/Java-Coding-Standards-20050303-releaseASoftE/JavaCodingStandards.pdf],. preparedPrepared by: European Space Agency (ESA) Board for Software Standardisation and Control (BSSC). (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="07a560fdc4a463de-258b9dcf-4f564152-b26cb71b-c705810dabb740e130f6f1c8"><ac:parameter ac:name="">Fairbanks 07</ac:parameter></ac:structured-macro> \[Fairbanks 2007\] [Fairbanks, George. [Design Fragments|http://reports-archive.adm.cs.cmu.edu/anon/isri2007/abstracts/07-108.html]. PhD thesis, Carnegie Mellon University (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4e69afe6c18a5bcd-7eadea6d-4db0433b-a71c993d-2a7ba292c48ffa4ff4d668d5"><ac:parameter ac:name="">FindBugs 08</ac:parameter></ac:structured-macro> \[FindBugs 2008\] [FindBugs Bug Descriptions|http://findbugs.sourceforge.net/bugDescriptions.html] (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dfd8e45df1b48731-b53498d1-471647e8-a5c2b31f-5b8892097b3d721872ab81c1"><ac:parameter ac:name="">Fisher 03</ac:parameter></ac:structured-macro> \[Fisher 2003\] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. _JDBC API Tutorial and Reference_, 3rd edition,ed. byUpper MaydeneSaddle FisherRiver, Jon Ellis, and Jonathan Bruce,NJ: Prentice Hall, The Java Series. (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="62be7d851768307a-545e7f50-4084465f-8e979150-8b5713f7541af2740c423736"><ac:parameter ac:name="">Flanagan 05</ac:parameter></ac:structured-macro> \[Flanagan 2005\] Flanagan, David. _Java in a Nutshell_, 5th ed. editionSebastopol, by David Flanagan, CA: O'Reilly Media, Inc. (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="38208dffe82c7ad8-bb3e68c7-40304d8b-b65abb61-7d2c0e44bcdea20ead7cca36"><ac:parameter ac:name="">Fortify 08</ac:parameter></ac:structured-macro> \[Fortify 2008\] Fortify Software Security Research Group with Gary McGraw. [A Taxonomy of Coding Errors thatThat Affect Security|http://www.fortify.com/vulncat/en/vulncat/index.html] (see Java/JSP, Fortify Software. ) (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="162c954b07738a18-8a2a792f-47e346a1-99a5af9c-0835c84e41a56f8d9e4d6bf7"><ac:parameter ac:name="">Fox 01</ac:parameter></ac:structured-macro> \[Fox 2001\] Fox, Joshua. [When isIs a Singleton notNot a Singleton?, by Joshua Fox, Sun Developer Network (SDN)|http://www.javaworld.com/javaworld/jw-01-2001/jw-0112-singleton.html]. _JavaWorld_ (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b4d96482557103c-23756fb7-4a57421f-a63f8c60-34ab2708058a281e0ffea503"><ac:parameter ac:name="">FT 08</ac:parameter></ac:structured-macro> \[FT 2008\] [Function Table|http://www.stylusstudio.com/api/xalan-j_2_6_0/org/apache/xpath/compiler/FunctionTable.htm]: Class FunctionTable, Field detailDetail, public static FuncLoader m_functions. Apache XML Project (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a465bf22c3319075-5cead4d1-404b456e-b4b88fb3-1db5c99de9c50bec1adf63ad"><ac:parameter ac:name="">Gafter 06</ac:parameter></ac:structured-macro> \[Gafter 2006\] Gafter, Neal. [Neal Gafter's blog|http://gafter.blogspot.com/], by Neal Gafter's. (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="550c861f926dcf67-c727d4d7-4a3343c0-8d9c9b41-75f22bb87bffaa6e3b19cb68"><ac:parameter ac:name="">Gamma 95</ac:parameter></ac:structured-macro> \[Gamma 1995\] Design Patterns: Elements of Reusable Object-Oriented SoftwareGamma, by Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides. Addison-Wesley Professional Computing Series._Design Patterns: Elements of Reusable Object-Oriented Software_. Reading, MA: Addison-Wesley (1995). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="851a5216ad675050-7b6ff76c-42a347a6-b6fcb3c1-641c06e8707563e56f7300b1"><ac:parameter ac:name="">Garms 01</ac:parameter></ac:structured-macro> \[Garms 2001\] Professional Java Security, byGarms, Jess, Garms and Daniel Somerfield. _Professional Java Security_. Birmingham, UK: Wrox Press Ltd. (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3d01d86fe74782cf-7141fac9-4900437e-9535a880-299ba517c5836c80837857ce"><ac:parameter ac:name="">Goetz 02</ac:parameter></ac:structured-macro> \[Goetz 2002\] Goetz, Brian. [Java theoryTheory and practicePractice: Safe Construction Techniques: Don't letLet the "this" referenceReference escapeEscape during constructionConstruction|http://www.ibm.com/developerworks/java/library/j-jtp0618.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2002). (2002) |
Wiki Markup |
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8ae8e582bd8d5649-feff7f60-4db74dfc-abd9b84e-b94881f02395b6a86efe095a"><ac:parameter ac:name="">Goetz 04</ac:parameter></ac:structured-macro> \[Goetz 2004\] Goetz, Brian. [Java theoryTheory and practicePractice: Garbage collectionCollection and performance|http://Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes|http://www.ibm.com/developerworks/java/library/j-jtp01274.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2004). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c8b9d119157b4bff-21ca9e5f-4da048b7-9e8db967-d356a2f99f3b96403e97de56"><ac:parameter ac:name="">Goetz 04b</ac:parameter></ac:structured-macro> \[Goetz 2004b\] Goetz, Brian. [Java theoryTheory and practicePractice: The exceptionsExceptions debateDebate: To checkCheck, or notNot to checkCheck?|http://www.ibm.com/developerworks/library/j-jtp05254.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2004). (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="58a8c35c21dae112-f5c7593a-41fa4dfa-bbf1855b-1f1c4497f8949c71f10a6692"><ac:parameter ac:name="">Goetz 04c</ac:parameter></ac:structured-macro> \[Goetz 2004c\] Goetz, Brian. [Java theoryTheory and practicePractice: Going atomicAtomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent|http://www.ibm.com/developerworks/java/library/j-jtp11234/],. byIBM Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology). (2004)developerWorks (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bf0f5ff699d26e78-3691b8fb-44a64feb-bd1cb4c7-503d193b41d657059df5acba"><ac:parameter ac:name="">Goetz 05</ac:parameter></ac:structured-macro> \[Goetz 2005\] Goetz, Brian. [Java theoryTheory and practicePractice: Be a goodGood (event) listenerListener, Guidelines for writingWriting and supportingSupporting eventEvent listenersListeners|http://www.ibm.com/developerworks/java/library/j-jtp07265/index.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2005). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5d576c3bafd97dd2-4d4a88d5-48414fb7-8ed5b6b8-f9277157b451fe989b00bf1e"><ac:parameter ac:name="">Goetz 05b</ac:parameter></ac:structured-macro> \[Goetz 2005b\] Goetz, Brian. [Java theoryTheory and practicePractice: Plugging memoryMemory leaksLeaks with weak referencesWeak References: Weak References Make It Easy to Express Object Lifecycle Relationships|http://www.ibm.com/developerworks/java/library/j-jtp11225/], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2005). (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="964f4b12aff05161-63542182-4270400b-9da8978d-bdf3d1f7f7cf85c5abb0b78c"><ac:parameter ac:name="">Goetz 06</ac:parameter></ac:structured-macro> \[Goetz 2006\] Java Concurrency in Practice, by Brian GoetzGoetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. _Java Concurrency Addison in Practice_. Upper Saddle River, NJ: Addison-Wesley Professional. (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1bc6f8cd0da39796-cfd5cbd1-4a814a5e-aa2197d1-08d5dcb2c241fb8f899ebcd9"><ac:parameter ac:name="">Goetz 06b</ac:parameter></ac:structured-macro> \[Goetz 2006b\] Goetz, Brian. [Java theoryTheory and practicePractice: Good housekeepingHousekeeping practicesPractices|http://www.ibm.com/developerworks/java/library/j-jtp03216.html], by Brian Goetz, Principal Consultant, Quiotix. IBM developerWorks (Java technology2006). (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="50f48490916a9d5a-43f3a39f-4d6b4bf1-ad869277-0e5b3e8497dfe8ff4a361baf"><ac:parameter ac:name="">Goetz 07</ac:parameter></ac:structured-macro> \[Goetz 2007\] Goetz, Brian. [Java theoryTheory and practicePractice: Managing volatility,Volatility: Guidelines for usingUsing volatileVolatile variablesVariables|http://www.ibm.com/developerworks/java/library/j-jtp06197.html], by Brian Goetz, Senior Staff Engineer, Sun Microsystems. IBM developerWorks (Java technology2006). (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5fb8dd5bfd7f2725-1b183cf1-474741e5-92f7a306-59b2e09f70225561b7835ffd"><ac:parameter ac:name="">Goldberg 91</ac:parameter></ac:structured-macro> \[Goldberg 1991\] Goldberg, David. [What Every Computer Scientist Should Know About Floating-Point Arithmetic| http://docs.sunoracle.com/cd/sourceE19957-01/806-3568/ncg_goldberg.html]. Sun©Sun Microsystems, Inc. March 1991. (1991/2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="31abc170e1fc09ad-144bb6d0-471a4751-af75a883-397e75743cc9d8ee5fafb8e7"><ac:parameter ac:name="">Gong 03</ac:parameter></ac:structured-macro> \[Gong 2003\] Gong, Li, Gary Ellison, and Mary Dageforde. _Inside Java 2 Platform Security: Architecture, API Design, and Implementation_, 2nd edition,ed. byUpper LiSaddle GongRiver, Gary Ellison, and Mary Dageforde.NJ: Prentice Hall, The Java Series. (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="678c32c26c6172cf-fecb0a24-404f47c5-87b7b1c0-a6d3ceb4ce393e0b089d879f"><ac:parameter ac:name="">Grand 02</ac:parameter></ac:structured-macro> \[Grand 2002\] Grand, Mark. _Patterns in Java, VolumeVol. 1_, Second2nd Edition,ed. byNew MarkYork: Grand. Wiley. (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3794b6e58791d9df-4453bcf4-4547464d-ba1bb3d6-d68e0b1624da7796a50f13f7"><ac:parameter ac:name="">Greanier 00</ac:parameter></ac:structured-macro> \[Greanier 2000\] Greanier, Todd. [Discover the secretsSecrets of the Java Serialization API|http://java.sun.com/developer/technicalArticles/Programming/serialization/], by Todd Greanier,. Sun Developer Network (SDN). (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c50855aabf6bc053-cc4da5b3-418a4436-be6bbc41-f92e1ab19328008de0342433"><ac:parameter ac:name="">Green 08</ac:parameter></ac:structured-macro> \[Green 2008\] Green, Roedy. [Canadian Mind Products Java & Internet Glossary|http://mindprod.com/jgloss/jgloss.html] by Roedy Green. (2008)(2008/2012). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f9d17979894457dc-715bfbb2-439d4181-af219299-1572b8242a816cd62499a47f"><ac:parameter ac:name="">Grigg 06</ac:parameter></ac:structured-macro> \[Grigg 2006\] Grigg, Jeffery. [Reflection Onon Inner Classes|http://www.c2.com/cgi/wiki?ReflectionOnInnerClasses] by Jeffery Grigg. (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4d896efbc6b005e4-e823fa0d-4f6e4cd8-bc558c72-f486a22dee1686cf7b0a1a45"><ac:parameter ac:name="">Grosso 01</ac:parameter></ac:structured-macro> \[Grosso 2001\] Grosso, William. [_Java RMI_|http://oreilly.com/catalog/javarmi/chapter/ch10.html]. Sebastopol, by William Grosso. CA: O'Reilly. (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="42924508f9b6ad35-f8f351f5-4a524d3f-931a84c2-beff587067d2e9696727e02d"><ac:parameter ac:name="">Gupta 05</ac:parameter></ac:structured-macro> \[Gupta 2005\] Gupta, Satish Chandra, and Rajeev Palanki. [Java memory leaks - Catch me if you canMemory LeaksâCatch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0|http://www.ibm.com/developerworks/rational/library/05/0816_GuptaPalanki/],. by Satish Chandra Gupta and Rajeev Palanki. IBM developerWorks (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9952e13ba155076c-a7e16c2a-403b436c-9e0eb38c-08056533fb31f96e3e72b755"><ac:parameter ac:name="">Haack 06</ac:parameter></ac:structured-macro> \[Haack 2006\] [Immutable Objects in JavaHaack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. [_Immutable Objects in Java_|https://pms.cs.ru.nl/iris-diglib/src/getContent.php?id=2006-Haack-ObjectsImmutable], by Christian Haack, Erik Poll, Jan Schafer and Aleksy Schubert. (research report). Radboud University Nijmegen (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b31e049838fd567c-c2fa5e10-4e9f407c-a3ccbdde-2c3271623c51a4db62be4644"><ac:parameter ac:name="">Haggar 00</ac:parameter></ac:structured-macro> \[Haggar 2000\] Haggar, Peter. _Practical Java⢠Programming Language Guide_. Reading, by Peter Haggar. MA: Addison-Wesley Professional. (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="05e21f26113aff92-55e4f8a9-4f084d09-b0768333-68c1841555359cef7d996b39"><ac:parameter ac:name="">Halloway 00</ac:parameter></ac:structured-macro> \[Halloway 2000\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://javajavaservice.sun.comnet/developer~java/TechTipsbbs/2000/tt0328.htmlread.cgi?m=devtip&b=jdc&c=r_p_p&n=954297433], March 28, 2000,. © bySun StuartMicrosystems Halloway(2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef0f4cc0e9c0eaca-0f5eae72-45d04513-8d6a9aff-39e3b1f9b6fecc3347d8a2fe"><ac:parameter ac:name="">Halloway 01</ac:parameter></ac:structured-macro> \[Halloway 2001\] Halloway, Stuart. [Java Developer Connection Tech Tips|http://javawww.sunjavaservice.comnet/developer~java/JDCTechTipsbbs/2001/tt0130.htmlread.cgi?m=devtip&b=jdc&c=r_p&n=981107352&p=1&s=t], January 30, 2001,. © bySun StuartMicrosystems Halloway(2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5eeb3abdadaa0d54-39363c9f-42c34ad2-978c8ba1-1103e6ef8e61591df6409c42"><ac:parameter ac:name="">Harold 97</ac:parameter></ac:structured-macro> \[Harold 1997\] Harold, Elliotte Rusty. _Java Secrets by Elliotte Rusty Harold. Wiley._. Foster City, CA: IDG Books Worldwide (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="726e57b89379aae6-6b7a055f-4ff645f9-82029448-f14192ac0aedd6e930b69b48"><ac:parameter ac:name="">Harold 99</ac:parameter></ac:structured-macro> \[Harold 1999\] Harold, Elliotte Rusty. _Java I/O_. Sebastopol, by Elliotte Rusty Harold. CA: O'REILLY.Reilly (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ea9a31e1ed0028da-1912a590-45d842c3-83acb221-0cfb6b0b51cd32e260c67673"><ac:parameter ac:name="">Harold 06</ac:parameter></ac:structured-macro> \[Harold 2006\] Harold, Elliotte Rusty. _Java I/O_, by2nd Elliotteed. RustySebastopol, Harold (2nd Edition). CA: O'Reilley. (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="44d7d135feb8bd9f-266e79f6-4b9643f4-b73d8b5d-bd85c94d1a5f22f05d099c5a"><ac:parameter ac:name="">Hawtin 08</ac:parameter></ac:structured-macro> \[Hawtin 2008\] Hawtin, Thomas. [Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities|http://www.makeitfly.co.uk/Presentations/london-securecoding.pdf] by Thomas Hawtin,. Sun Microsystems, Inc., Make itIt Fly 2008,. London. (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="12e4e2f5de467767-afdf5542-4b6e4866-a6559089-d42496826c3b261c4d6d6309"><ac:parameter ac:name="">Henney 03</ac:parameter></ac:structured-macro> \[Henney 2003\] Henney, Kevlin. [Null Object, Something for Nothing|http://www.two-sdg.demon.co.uk/curbralan/papers/europlop/NullObject.pdf], by Kevlin Henney (2003). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f89846ce3652d0a1-111b421b-45104b9d-8fbda0fd-cd678e4f22da3cc231e6979e"><ac:parameter ac:name="">Hitchens 02</ac:parameter></ac:structured-macro> \[Hitchens 2002\] Hitchens, Ron. _Java⢠NIO_. Cambridge, by Ron Hitchens. MA: O'Reilly. (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfa2ca08d247665d-8473eb8a-4d5e42f8-98bdb3ad-069ece58ce003bf3a7b0a862"><ac:parameter ac:name="">Hornig 07</ac:parameter></ac:structured-macro> \[Hornig 2007\] Hornig, Charles. [Advanced Java⢠Globalization|http://developers61.153.sun44.com88/learningjavaone/javaoneonline/2007/pdfjava-se/TS-2873.pdf], by Charles Hornig, Globalization Architect, IBM Corporation. JavaOne Conference. (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="10c45cfd305164ad-bfaa9150-48e64010-bcf18c7e-9c8225508018c27bdab669c1"><ac:parameter ac:name="">Hovemeyer 07</ac:parameter></ac:structured-macro> \[Hovemeyer 2007\] FindingHovemeyer, more null pointer bugs, but not too many, by David Hovemeyer and William Pugh. David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In _Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshopWorkshop on Program analysisAnalysis for softwareSoftware toolsTools and engineering.Engineering (PASTE)_, San Diego (2007). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc0d3a45c163752d-2c9167fd-4d174338-8e2b8b8d-9b108c8e219bc74853a1ae8d"><ac:parameter ac:name="">Hunt 98</ac:parameter></ac:structured-macro> \[Hunt 1998\] Hunt, J., and F. Long. Java's reliabilityReliability: anAn analysisAnalysis of softwareSoftware defectsDefects in Java, by J. Hunt_IEE and F. Long. Software IEE Proceedings. Proceedings: Software_ 145(2/3):41â50 (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="34c440f0af89c1e0-49f95935-4d5d469d-9ae19ee9-0f7ee1b004aa833c88804c7b"><ac:parameter ac:name="">IEC 60812 2006</ac:parameter></ac:structured-macro> \[IEC 60812 2006\] IEE (International Electrotechnical Commission). _Analysis techniquesTechniques for system reliability -System Reliability: Procedure for failureFailure modeMode and effectsEffects analysisAnalysis (FMEA)_, 2nd ed. (IEC 60812). IEC, January 2006Geneva: IEC (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6503383bc0ba0d70-1b8be096-48234b95-81359254-21bde3d212e57d587d19d814"><ac:parameter ac:name="">IEEE 754 2006</ac:parameter></ac:structured-macro> \[IEEE 754 2006\] IEEE (Institute of Electrical and Electronics Engineers). [_Standard for Binary Floating-Point Arithmetic_|http://grouper.ieee.org/groups/754/] (IEEE 754-1985), 2006. New York: IEEE (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8c54c7f4c9bc043a-c3e61863-420a4998-8eb9a73f-efbf4b103847c175b8f3a722"><ac:parameter ac:name="">J2SE 00</ac:parameter></ac:structured-macro> \[J2SE 2000\] JavaTM 2 SDK, Standard Edition Documentation, Sun Microsystems, Inc. [J2SE Documentation version 1.3|http://javadocs.sunoracle.com/j2sejavase/1.3/docs/guide/],. Sun Microsystems,/Oracle Inc. (2000/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d36405a594de9319-4dbc6df6-42df4ed4-b641b336-9ea51c3bb917093c15728f43"><ac:parameter ac:name="">JarSpec 08</ac:parameter></ac:structured-macro> \[JarSpec 2008\] J2SE Documentation version 1.5, [Jar File Specification|http://javadocs.sunoracle.com/j2sejavase/1.5.0/docs/guide/jar/jar.html],. Sun Microsystems, Inc. /Oracle (2000/2010). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a99b3781a55ff255-784a3ef7-41334ffb-bc74b2a9-15c5c0b3d5bd23d50d32ccfc"><ac:parameter ac:name="">Java 06</ac:parameter></ac:structured-macro> \[Java 2006\] [java: -The the Java applicationApplication launcherLauncher|http://javadocs.sunoracle.com/javase/6/docs/technotes/tools/windows/java.html],. Sun Microsystems,/Oracle Inc. (2006/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5b9ca9e93cf0983b-20aca7e5-4be845e7-a660be9a-1fa2a3f8fb0174d9d6e241f1"><ac:parameter ac:name="">Java2NS 99</ac:parameter></ac:structured-macro> \[Java2NS 1999\] JavaPistoia, 2Marco, Network Security, by Marco Pistoia, Duane Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. IBM Corporation. _Java 2 Network Security_. Upper Saddle River, NJ: Prentice Hall (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76003e27cac54280-301ea560-451b4f9e-b12aa5b1-2a28b0858ef98a93a50e4463"><ac:parameter ac:name="">JavaGenerics 04</ac:parameter></ac:structured-macro> \[JavaGenerics 2004\] \[[Java Generics|http://javadocs.sunoracle.com/j2sejavase/1.5.0/docs/guide/language/generics.html]\], Sun Microsystems, Inc. Oracle. (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b78d3cbc4d43540a-f8d0933b-485a4a49-bb6bbf24-dcade5dff0408678a01dd230"><ac:parameter ac:name="">JavaThreads 99</ac:parameter></ac:structured-macro> \[JavaThreads 1999\] Java Threads (2nd Edition) byOaks, Scott Oaks, and Henry Wong. _Java Threads_, 2nd ed. Sebastopol, CA: O'REILLY.Reilly (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="61e3d5cda0f4f127-1d5c305c-46424184-b5249bf6-d61cd680615afde42a17f3f5"><ac:parameter ac:name="">JavaThreads 04</ac:parameter></ac:structured-macro> \[JavaThreads 2004\] Java Threads (3rd Edition) byOaks, Scott, Oaks and Henry Wong. O'REILLY. (2004) _Java Threads_, 3rd ed. Sebastopol, CA: O'Reilly (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ef93cd9330245fa8-465c48f3-4dce404a-a6969222-95be618e48e761507e3d9aa2"><ac:parameter ac:name="">JDK7 08</ac:parameter></ac:structured-macro> \[JDK7 2008\] [Java⢠Platform, Standard Edition 7 documentationDocumentation|http://downloaddocs.javaoracle.netcom/javase/jdk77/docs/], Sun Microsystems, Inc., 19 Dec 2008. Oracle (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0131f19cd341f9a1-980c7033-4f3a4e70-9e8f82cd-3555dcb5e0ef1f140b736962"><ac:parameter ac:name="">JLS 05</ac:parameter></ac:structured-macro> \[JLS 2005\] Java Language Specification, 3rd edition. byGosling, James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. _Java PrenticeLanguage HallSpecification_, The3rd Java Seriesed. [TheUpper JavaSaddle Language Specification.|http://java.sun.com/docs/books/jls/index.html]River, NJ: Prentice Hall (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4dc0824d0b124b69-94881c7f-4dad48db-81ca86c8-cc94ccc574bff14400bee039"><ac:parameter ac:name="">JLS 11</ac:parameter></ac:structured-macro> \[JLS 2011\] Java Language Specification: Java SE 7 Edition. byGosling, James Gosling, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Oracle America, Inc. [The Java Language Specification.[_Java Language Specification: Java SE 7 Edition_|http://downloaddocs.oracle.com/javase/7/specs/jls/JLS-JavaSE7.pdf] se7/html/index.html]. Oracle America (2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a513c8d21a08a5d8-f2331be9-49d3416f-adbb8299-dc481a3b5366dafbc9fb1644"><ac:parameter ac:name="">JMX 06</ac:parameter></ac:structured-macro> \[JMX 2006\] [Monitoring and Management for the Java Platform|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/management/index.html], Sun Microsystems, Inc. . Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="844e793e2700761e-91203cf3-4e6f4085-9252b5bb-984ebf1601df4e7389461074"><ac:parameter ac:name="">JMXG 06</ac:parameter></ac:structured-macro> \[JMXG 2006\] [Java SE Monitoring and Management Guide|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/management/toc.html], Sun Microsystems, Inc.. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="050a3ad51c40cf8e-c0d17274-4c38496f-8cedb68e-336641902525d54fa7124fb8"><ac:parameter ac:name="">JNI 06</ac:parameter></ac:structured-macro> \[JNI 2006\] [Java Native Interface|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/jni/index.html], Sun Microsystems, Inc. . Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="52169b8ad827ef88-6db142e3-4fe64e46-aa6cb56f-c65303e94a3379a7aa35bc05"><ac:parameter ac:name=""> Jovanovic 06</ac:parameter></ac:structured-macro> \[Jovanovic 2006\] Jovanovic, Nenad Jovanovic, Christopher Kruegel, and Engin Kirda,. [Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)|http://dx.doi.org/10.1109/SP.2006.29],. In _Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06)_, p.258-263pp. 258â263, May 21-24 21â24, Oakland, CA (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f2757cd3bf0ab1d9-4b055546-42ac4535-aa989c84-f19cd42bb37ff7311ff0b7a1"><ac:parameter ac:name="">JPDA 04</ac:parameter></ac:structured-macro> \[JPDA 2004\] [Java Platform Debugger Architecture (JPDA)|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/jpda/index.html],. Sun Microsystems, Inc. Oracle (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c1ea1766e7295b22-c6e0af1d-467142fe-93d99a5c-807febc4d7156919faec09ce"><ac:parameter ac:name="">JPL 06</ac:parameter></ac:structured-macro> \[JPL 2006\] TheArnold, Javaâ¢Ken, ProgrammingJames LanguageGosling, Fourthand Edition,David byHolmes. Ken_The Arnold,Java⢠JamesProgramming GoslingLanguage_, David4th Holmes.ed. Reading, MA: Addison -Wesley Professional. (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="750e59e3a0bb5347-3ef862e9-46834769-a457bc83-cd0c3f9d3877a189e079a32f"><ac:parameter ac:name="">JSR-133 04</ac:parameter></ac:structured-macro> \[JSR-133 2004\] [JSR-133: JavaTM Memory Model and Thread Specification|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr133.pdf]. (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="14a2fd6e1ff968f3-d65abe5e-4d0b4fc3-8ce2a2c5-d78194b8260c8bce3c296bb3"><ac:parameter ac:name="">JVMTI 06</ac:parameter></ac:structured-macro> \[JVMTI 2006\] [Java Virtual Machine Tool Interface (JVM TI)|http://javadocs.sunoracle.com/javase/6/docs/technotes/guides/jvmti/index.html],. Sun Microsystems, Inc. Oracle (2006). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0f11694e593364dc-5e753585-4cf74e63-b7e59fd5-48207d4a89fa96bc42c2efa5"><ac:parameter ac:name="">JVMSpec 99</ac:parameter></ac:structured-macro> \[JVMSpec 1999\] [The Java Virtual Machine Specification|http://javadocs.sunoracle.com/docsjavase/books/jvmsspecs/], Sun Microsystems, Inc.. Oracle (1999). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f5daf4624eb30799-7d8acd92-4fed4c65-a9e9aa6f-c8dc49a38f9fa8429d2a5494"><ac:parameter ac:name="">Kabanov 09</ac:parameter></ac:structured-macro> \[Kabanov 2009\] Kabanov, Jevgeni. [The Ultimate Java Puzzler|http://dow.ngra.de/2009/02/16/the-ultimate-java-puzzler/] by Jevgeni Kabanov, Core developer of JavaRebel. February 16th, 2009. (2009)(2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b6892db4bda218af-4c456e84-43094828-905f8a33-b47ddfb65ad17269a1bc732a"><ac:parameter ac:name="">Kabutz 01</ac:parameter></ac:structured-macro> \[Kabutz 2001\] Kabutz, Heinz M. _The Java Specialists' Newsletter, by Dr. Heinz M. Kabutz_. (2001). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0c96763a3dedb416-de7a9820-4078470f-aa8b9f54-1df2155c64c9b0750a433050"><ac:parameter ac:name="">Kalinovsky 04</ac:parameter></ac:structured-macro> \[Kalinovsky 2004\] Kalinovsky, Alex. _Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, by Alex Kalinovsky._. Indianapolis: SAMS Publishing. (2004). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9719d5219893ec1d-5b0a4098-411f437e-9f9f8153-e354666aabbdeae0c8c997be"><ac:parameter ac:name="">Knoernschild 01</ac:parameter></ac:structured-macro> \[Knoernschild 2001\] Knoernschild, Kirk. _Java⢠Design: Objects, UML, and Process, by Kirk Knoernschild._. Boston: Addison-Wesley Professional. (2001). |
Anchor
Wiki Markup |
---|
\[Lai 2008\] [Java Insecurity: Accounting <ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0aa0df7b-57ae-47b5-bb5a-0496a1809f13"><ac:parameter ac:name="">Lai 08</ac:parameter></ac:structured-macro> \[Lai 2008\] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code,. by_IEEE Charlie Lai, Sun Microsystems|http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4420062]Software_ 25(1):13â19 (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d5974484c12e5582-6bc39a33-442d41dc-82878dbc-af756bd8c47f307f85fb6beb"><ac:parameter ac:name="">Langer 08</ac:parameter></ac:structured-macro> \[Langer 2008\] Langer, Angelica, trainer and consultant. [http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html|http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html], Angelica Langer. (2008). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4a166c8c820ea011-5f43f9e8-4d464962-a6e4ae52-993b5ad1e96bd5c1c8c111f7"><ac:parameter ac:name="">Lea 00</ac:parameter></ac:structured-macro> \[Lea 2000\] Lea, Doug. _Concurrent Programming in Java, 2nd edition, by Doug Lea. Addison Wesley, Sun Microsystems, Inc.: Design Principles and Patterns_, 2nd ed. Reading, MA: Addison-Wesley (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0b57ad517e9c5d62-fe8ada3b-4655467a-ba6e8d27-2778bcc2c582d3e934ab8084"><ac:parameter ac:name="">Lea 00b</ac:parameter></ac:structured-macro> \[Lea 2000b\] Lea, Doug, and William Pugh. [Correct and Efficient Synchronization of Java⢠TechnologyTechnologyâbased based Threads|http://www.cs.umd.edu/~pugh/java/memoryModel/TS-754.pdf], by Doug Lea and William Pughpdf]. JavaOne Conference. (2000). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="40110d207f93b59b-1b7c9254-4aca4479-9a91b336-af321d1080c6f9d383714ab7"><ac:parameter ac:name="">Lea 08</ac:parameter></ac:structured-macro> \[Lea 2008\] Lea, Doug. [The JSR-133 Cookbook for Compiler Writers|http://g.oswego.edu/dl/jmm/cookbook.html], by Doug Lea. (2008/2011). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e6cb42ed2dc9564e-1592544d-4bfc45df-b35195f0-772904c261855451b47ebc9d"><ac:parameter ac:name="">Lee 09</ac:parameter></ac:structured-macro> \[Lee 2009\] Lee, Sangjin, Mahesh Somani, and Debashis Saha eBay Inc. [Robust and Scalable Concurrent Programming: Lessons from the Trenches|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4620.pdf], by Sangjin Lee, Mahesh Somani, & Debashis Saha, eBay Inc. JavaOne Conference. (2009). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="660971c64ad8add1-58368c33-4eec49de-a2779724-68bcfb4a0b21da6c1d046767"><ac:parameter ac:name="">Liang 97</ac:parameter></ac:structured-macro> \[Liang 1997\] Liang, Sheng. _The Java⢠Native Interface, Programmer's Guide and Specification_. Reading, by Sheng Liang. ADDISON-WESLEY.MA: Addison-Wesley (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="daf87b0986a47e11-e8e66a4d-473741c1-ac05aaef-3c840c41da42a9993f33e17d"><ac:parameter ac:name="">Liang 98</ac:parameter></ac:structured-macro> \[Liang 1998\] Liang, Sheng, and Gilad Bracha. [Dynamic Class Loading in the Java⢠Virtual Machine|http://portal.acm.org/citation.cfm?doid=286936.286945], by Sheng Liang and Gilad Bracha. ]. In _Proceedings of the 13th ACM SIGPLAN conferenceConference on Object-orientedOriented programmingProgramming, systemsSystems, languagesLanguages, and applications.Applications_, New York (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e9bb8a99e30247ee-53b29c96-4cbe4352-87c9ac47-7e8bb6163639258181c36eda"><ac:parameter ac:name="">Lieberman 86</ac:parameter></ac:structured-macro> \[Lieberman 1986\] Lieberman, Henry. [Using prototypicalPrototypical objectsObjects to implementImplement sharedShared behaviorBehavior in objectObject-orientedOriented systemsSystems|http://portal.acm.org/citation.cfm?id=28718]. In: _Proceedings of the Conference proceedings on Object-orientedOriented programmingProgramming systemsSystems, languagesLanguages and applications. Portland 1986Applications_, ppp. 214-223 ISSN 0362-1340214â223, by Henry LiebermanPortland, Massachusetts Institute of Technology. OR (1986). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d7570ad32ab33ba4-6f18cab7-4f6a4e3e-ba19888e-8b3bb89ca644ff1f1990c017"><ac:parameter ac:name="">Lo 05</ac:parameter></ac:structured-macro> \[Lo 2005\] [Security Issues in Garbage Collection|http://www.stsc.hill.af.mil/crosstalk/2005/10/0510DanLo.html], by Dr. /ac:structured-macro> \[Lo 2005\] Lo, Chia-Tien Dan Lo, University of Texas at San Antonio, Dr. Witawas Srisa-an, UniversityWitawas, of Nebraska at Lincolnand Chang, DrJ. JMorris. Morris[Security Chang,Issues Iowain State University. Garbage Collection|http://www.eng.auburn.edu/users/hamilton/security/papers/STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%A02005.pdf]. _STSC Crosstalk_, October 2005 issue. (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fe3180f536b8cde4-1d6e4ba3-48d3432a-841c84e5-5a244ae39d4068633445e884"><ac:parameter ac:name="">Long 05</ac:parameter></ac:structured-macro> \[Long 2005\] Long, Fred. [Software Vulnerabilities in Java|http://www.sei.cmu.edu/publications/documents/05.reports/05tn044.html], by Fred Long,. CMU/SEI-2005-TN-044. (2005). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="1eec160bb83f4bc0-a1f0c62e-449e4937-89e4af8f-e7f50d34cd5135e28407d181"><ac:parameter ac:name="">Long 11</ac:parameter></ac:structured-macro> \[Long 2011\] The CERT Oracle Secure Coding Standard for Java, by Fred LongLong, Fred, Dhruv Mohindra, Robert C. Seacord, and Dean F. Sutherland, Addison-Wesley. _The CERT Oracle Secure Coding Standard for Java_, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f53f3130fa1eba2f-c34f624b-479c4729-be32a731-eb71cd393a0427114633cb8f"><ac:parameter ac:name="">Low 97</ac:parameter></ac:structured-macro> \[Low 1997\] Low, Douglas. [Protecting Java Code via Obfuscation|http://www.cs.arizona.edu/~collberg/Research/Students/DouglasLow/obfuscation.html], by Douglas Low. _Crossroads_ 4(3):21â23 (1997). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63c9171fe5d8bf48-74a03760-4d214f64-a349a323-19e721d85397b6db5ac89c22"><ac:parameter ac:name="">Macgregor 98</ac:parameter></ac:structured-macro> \[Macgregor 1998\] Java Network SecurityMacgregor, by Robert Macgregor, Dave Durbin, John Owlett, and Andrew Yeomans. _Java Network Security_. Upper Saddle River, NJ: Prentice Hall. PTR (1998). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cfe3fbfba906f762-e916330c-4890466f-9f7f9330-ccf63c7d19d15a901eb25476"><ac:parameter ac:name="">Mahmoud 02</ac:parameter></ac:structured-macro> \[Mahmoud 2002\]\] Mahmoud, H. Qusay. [Compressing and Decompressing Data Using Java APIs|http://java.sun.com/developer/technicalArticles/Programming/compression/], by Qusay H. Mahmoud. Oracle. (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0fe257fd0e391ec2-e8fd8f69-49f3427d-9322a82e-cfd6bf45c20b40b142ba74ca"><ac:parameter ac:name="">Mak 02</ac:parameter></ac:structured-macro> \[Mak 2002\] Mak, Ronald. _Java Number Cruncher,: The Java Programmer's Guide to Numerical Computing, by Ronald Mak._. Upper Saddle River, NJ: Prentice Hall. (2002). |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="e77b37ebf3d3db1e-26335bba-4e7b46ec-8637bfea-34d3a9f9d197334f261ff481"><ac:parameter ac:name="">Manson 04</ac:parameter></ac:structured-macro> \[Manson 2004\] [JSR 133 (Java Memory Model) FAQ|http://www.cs.umd.edu/~pugh/java/memoryModel/jsr-133-faq.html#finalRight], by Jeremy Manson and Brian Goetz. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="92b755348a9cb8d8-2aec4a68-4948447d-9cff8cdb-d9069c5517212b62e778e934"><ac:parameter ac:name="">Manson 06</ac:parameter></ac:structured-macro> \[Manson 2006\] [The Java⢠Memory Model: the building block of concurrency|http://developers.sun.com/learning/javaoneonline/2006/coreplatform/TS-1630.pdf], by Jeremy Manson and William Pugh, JavaOne Conference. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a672fbfa9298e6d1-1f00d66f-447244b1-b9bc8055-4172154830de9ba21487a30a"><ac:parameter ac:name="">Martin 96</ac:parameter></ac:structured-macro> \[Martin 1996\] [Granularity|http://www.objectmentor.com/resources/articles/granularity.pdf], by Robert C. Martin. (1996) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="840aca8f0f7ec55c-6cf487c6-4842489f-b04090ed-a8cd0930472373baaf2abecb"><ac:parameter ac:name="">McCluskey 01</ac:parameter></ac:structured-macro> \[McCluskey 2001\] Java Developer Connection Tech Tips, by Glen McCluskey, April 10, 2001. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="136bf9684bf596d4-51070d91-4e744c47-8899b77c-cc5df147fe95c19b7d5e48ef"><ac:parameter ac:name="">McGraw 99</ac:parameter></ac:structured-macro> \[McGraw 1999\] Securing Java, Getting Down to Business with Mobile Code, by Gary McGraw and Edward W. Felten. Wiley. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7a9517b6e21e1972-ee9c8882-429f4a8c-a20b938e-5838d8e30997fc3110a73247"><ac:parameter ac:name="">McGraw 98</ac:parameter></ac:structured-macro> \[McGraw 1998\] [Twelve rules for developing more secure Java code|http://www.javaworld.com/javaworld/jw-12-1998/jw-12-securityrules.html], Gary McGraw and Edward Felten, JavaWorld.com. (1998) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc88f42b149fac0b-45fff529-4f4642f8-b89cba00-38f62efce35c0180f9907bb8"><ac:parameter ac:name="">Miller 09</ac:parameter></ac:structured-macro> \[Miller 2009\] [Java⢠Platform Concurrency Gotchas|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-4863.pdf], by Alex Miller, Terracotta. JavaOne Conference. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0177dad4a0272d70-071307ae-44e94a3d-97f0a3e7-4ecde8907a23963f2e0a73e3"><ac:parameter ac:name="">MITRE 09</ac:parameter></ac:structured-macro> \[MITRE 2009\] [Common Weakness Enumeration|http://cwe.mitre.org/], MITRE Corporation. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cb25d31f9492a0db-0551c053-492e4fbc-8df9a517-bb4120493cca6471fc27d674"><ac:parameter ac:name="">Mocha 07</ac:parameter></ac:structured-macro> \[Mocha 2007\] [Mocha, the Java Decompiler|http://www.brouhaha.com/~eric/software/mocha/] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="53b503e108cbb00f-c3fac415-42e34b43-a0158dfb-b4797970b01fbf9a4539941c"><ac:parameter ac:name="">Monsch 06</ac:parameter></ac:structured-macro> \[Monsch 2006\] [Ruining Security with java.util.Random|http://www.iplosion.com/papers/ruining_security_with_java.util.random_v1.0.p] Version 1.0, by Jan P. Monsch. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="164b9525b7e155d2-3dc987a1-4e10460e-ac28a1cd-2fbf0b13a9acbf4c6f930555"><ac:parameter ac:name="">MSDN 09</ac:parameter></ac:structured-macro> \[MSDN 2009\] [Using SQL Escape Sequences|http://msdn.microsoft.com/en-us/library/ms378045(SQL.90).aspx], Microsoft Corporation. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="001f9f1c440939a7-55a7abd0-44f849a3-91698efe-1a766a977686b5d3451a279c"><ac:parameter ac:name="">Muchow 01</ac:parameter></ac:structured-macro> \[Muchow 2001\] [MIDlet Packaging with J2ME|http://www.onjava.com/pub/a/onjava/2001/04/26/midlet.html], by John W. Muchow (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="f26d1ebaf6c9eaa0-d61e6d2f-42584978-9f0895c3-a6f39923264c3014d730f3e1"><ac:parameter ac:name="">M&#xFC;ller 02</ac:parameter></ac:structured-macro> \[Müller 2002\] [Exception Handling: Common Problems and Best Practice with Java 1.4|http://www.old.netobjectdays.org/pdf/02/papers/industry/1430.pdf] by Dr. Andreas Müller and Geoffrey Simmons, Sun Microsystems GmbH. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2cc3259728517844-eeeac65c-41cb4f48-94158d01-a69a3155dd8e62b0f113c911"><ac:parameter ac:name="">Naftalin 06</ac:parameter></ac:structured-macro> \[Naftalin 2006\] Java Generics and Collections, Maurice Naftalin and Philip Wadler, O'Reilly (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="867b4e1c85689bee-9905ff99-46fd4278-b80ba35c-0f784282b79b11fddee1bb5b"><ac:parameter ac:name="">Naftalin 06b</ac:parameter></ac:structured-macro> \[Naftalin 2006b\] [Java⢠Generics and Collections: Tools for Productivity|http://gceclub.sun.com.cn/java_one_online/2007/pdf/TS-2890.pdf], by Maurice Naftalin, Morningside Light Ltd, Philip Wadler, University of Edinburgh. JavaOne Conference (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fdad163453ae8384-d0456a14-4c484460-bad4b2aa-4598b6278f081db4beea6549"><ac:parameter ac:name="">Netzer 92</ac:parameter></ac:structured-macro> \[Netzer 1992\] [What Are Race Conditions? Some Issues and Formalization|http://portal.acm.org/citation.cfm?id=130616.130623], by ROBERT H. B. NETZER and BARTON P. MILLER, University of Wisconsin --- Madison. (1992) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6459775506de4b20-b1123f6b-4fea48b3-86b2a88b-24fa61f19dbc79b90d5379fd"><ac:parameter ac:name="">Neward 04</ac:parameter></ac:structured-macro> \[Neward 2004\] Effective Enterprise Java, by Ted Neward. Addison Wesley Professional. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="8a46025b80575ecb-9bc14775-43184e55-bd63b2f6-e4ab86128c348070b59aa032"><ac:parameter ac:name="">Nisewanger 07</ac:parameter></ac:structured-macro> \[Nisewanger 2007\] [Avoiding Antipatterns, by Jeff Nisewanger, JavaOne Conference|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2594.pdf] (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="9ecacb8b0109d5d6-039df398-47f844c4-b0bfa49c-68352c245ef5402fd574fb1e"><ac:parameter ac:name="">Nolan 04</ac:parameter></ac:structured-macro> \[Nolan 2004\] Decompiling Java, by Godfrey Nolan, [Apress|http://www.apress.com/]. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="ccf040453c340a6e-e9cba6d2-424e4e84-a317b97a-8f86f0b76143720a87f89e92"><ac:parameter ac:name="">Oaks 01</ac:parameter></ac:structured-macro> \[Oaks 2001\] Java Security, by Scott Oaks. O'REILLY. (2001) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b1ab57446b2df22a-6263fd7a-438d432d-9d859a05-749a24ef45f5825939ebeba3"><ac:parameter ac:name="">Oracle 10</ac:parameter></ac:structured-macro> \[Oracle 2010a\] [Java SE 6 HotSpot\[tm\] Virtual Machine Garbage Collection Tuning|http://java.sun.com/javase/technologies/hotspot/gc/gc_tuning_6.html], Oracle Corporation. (2010) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b672c78d93f00891-7dbe0862-4d704b59-8796996f-a3a29f58abc084bfd5056d94"><ac:parameter ac:name="">OWASP 05</ac:parameter></ac:structured-macro> \[OWASP 2005\] [A Guide to Building Secure Web Applications and Web Services|http://internap.dl.sourceforge.net/sourceforge/owasp/OWASPGuide2.0.1.pdf]. The Open Web Application Security Project. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="184ae4229b1c15bc-1eb981b1-45664cec-91338ea0-52787b045336985e53c482f5"><ac:parameter ac:name="">OWASP 07</ac:parameter></ac:structured-macro> \[OWASP 2007\] [OWASP TOP 10 FOR JAVA EE|https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf]. The Open Web Application Security Project. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="97233453464088ec-e41d2e16-42bb4f24-892686f3-db698d8a9968a17bef9d30cd"><ac:parameter ac:name="">OWASP 08</ac:parameter></ac:structured-macro> \[OWASP 2008\] [OWASP|http://www.owasp.org/index.php/Main_Page]. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d673ee99c5ed2a69-b5b79f65-45d54534-8633ba42-3af16f7388d5a6fcaf54cc13"><ac:parameter ac:name="">Permissions 08</ac:parameter></ac:structured-macro> \[Permissions 2008\] [Permissions in the Java⢠SE 6 Development Kit (JDK)|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="33b6fc257c81c0b9-07895c56-4a2c4a55-a9f0aa91-68e148f96e03c89f34bf84de"><ac:parameter ac:name="">Philion 03</ac:parameter></ac:structured-macro> \[Philion 2003\] [Beware the dangers of generic Exceptions|http://www.javaworld.com/javaworld/jw-10-2003/jw-1003-generics.html?page=2#sidebar1], by Paul Philion, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="3a6fa001aa8a4300-f4a61676-4d594ff5-a82e9dd2-8a590e7ac39eae13d7363d78"><ac:parameter ac:name="">Phillips 05</ac:parameter></ac:structured-macro> \[Phillips 2005\] [Are We Counting Bytes Yet?|http://www.inter-locale.com/whitepaper/IUC27-a303.html] at the 27th Internationalization and Unicode Conference, by by Addison P. Phillips. webMethods, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ce5e5cb48e95090-d2f5edff-4e8a4958-bfcf94eb-27f2b81c35ba0ba2e1cc1fd7"><ac:parameter ac:name="">Pistoia 04</ac:parameter></ac:structured-macro> \[Pistoia 2004\] Enterprise Java Security: Building Secure J2EE Applications, by Marco Pistoia, Nataraj Nagaratnam, Larry Koved and Anthony Nadalin. Addison Wesley. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d80a2dc170833805-38245a39-4f544995-9fe1aef7-4d7fde7b6f56c83641e18638"><ac:parameter ac:name="">Policy 02</ac:parameter></ac:structured-macro> \[Policy 2002\] [Default Policy Implementation and Policy File Syntax|http://java.sun.com/javase/6/docs/technotes/guides/security/PolicyFiles.html], Document revision 1.6, Sun Microsystems, Inc. (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="431c9b78957198b1-1a4088e1-48d24dce-aadcb9c3-685332f6880e5f7409e89507"><ac:parameter ac:name="">Pugh 04</ac:parameter></ac:structured-macro> \[Pugh 2004\] [The Java Memory Model (discussions reference)|http://www.cs.umd.edu/~pugh/java/memoryModel/] by William Pugh, Univ. of Maryland. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="46eb3b2db5ae5c9e-22242b67-41e746d1-ac33a612-3a29ce25fea83d7ce23efff8"><ac:parameter ac:name="">Pugh 08</ac:parameter></ac:structured-macro> \[Pugh 2008\] [Defective Java Code: Turning WTF Code into a Learning Experience|http://developers.sun.com/learning/javaoneonline/2008/pdf/TS-6589.pdf?cid=925745], by William Pugh, Univ. of Maryland. JavaOne Conference. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="06a868d4a80f6957-cc8ea406-4790466a-8d54b386-b6184640a421583eb16b303c"><ac:parameter ac:name="">Pugh 09</ac:parameter></ac:structured-macro> \[Pugh 2009\] [Defective Java Code: Mistakes That Matter|http://developers.sun.com/learning/javaoneonline/sessions/2009/pdf/TS-5335.pdf], by William Pugh, Univ. of Maryland. JavaOne Conference. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d687b83c1f0dd980-be8c0844-444f4caf-8285a18f-bdc14c5fdecea1aa3f5ff17f"><ac:parameter ac:name="">Reasoning 03</ac:parameter></ac:structured-macro> \[Reasoning 2003\] [Reasoning Inspection Service Defect Data Tomcat v 1.4.24|http://www.reasoning.com/pdf/Tomcat_Defect_Report.pdf], Reasoning. 14 Nov 2003. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa80856ac88fa786-bc03c8c7-49d843ea-92f2a2a9-6b11a14ef74e6001cfc81130"><ac:parameter ac:name="">Reflect 06</ac:parameter></ac:structured-macro> \[Reflect 2006\] [Reflection|http://java.sun.com/javase/6/docs/technotes/guides/reflection/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="b64241d786da3065-46606bdd-4efd401b-97578989-7c5fa2b885923811da2b646e"><ac:parameter ac:name="">Rogue 00</ac:parameter></ac:structured-macro> \[Rogue 2000\] [The Elements of Java Style|http://www.ambysoft.com/books/elementsJavaStyle.html], by Vermeulen, Ambler, Metz, Misfeldt, Shur, and Thompson. Cambridge University Press (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="206260324f4b84ef-c4a64343-4168480e-84d3bb15-75bb0cba2ad3e633eecfe2e9"><ac:parameter ac:name="">Rotem 08</ac:parameter></ac:structured-macro> \[Rotem 2008\] [Fallacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf], by Arnon Rotem-Gal-Oz. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="794f5cc93aab9486-3dd3b003-46d44305-9316ad15-abd561b3f9d22785b84b1638"><ac:parameter ac:name="">Roubtsov 03</ac:parameter></ac:structured-macro> \[Roubtsov 2003\] [Breaking Java exception-handling rules is easy|http://www.javaworld.com/javaworld/javaqa/2003-02/02-qa-0228-evilthrow.html], by Vladimir Roubtsov, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="aaab919906c0019f-57818b82-43cd4246-90978bbb-32c619e67a31f8fbeb5deaf9"><ac:parameter ac:name="">Roubtsov 03b</ac:parameter></ac:structured-macro> \[Roubtsov 2003b\] [Into the mist of serialization myths|http://www.javaworld.com/javaworld/javaqa/2003-06/02-qa-0627-mythser.html?page=1], by Vladimir Roubtsov, JavaWorld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="588567c34d353435-ad8bc3b2-424c48fa-bbacb8a7-3f9d4badaae8908bff49e072"><ac:parameter ac:name="">Saltzer 74</ac:parameter></ac:structured-macro> \[Saltzer 1974\] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. _Communications of the ACM 17_, 7 (July 1974): 388---402. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a5a60c4c04ee755d-37888538-43dc4ad9-8febaefa-2f331f6a7f97c31ecb6df372"><ac:parameter ac:name="">Saltzer 75</ac:parameter></ac:structured-macro> \[Saltzer 1975\] Saltzer, J. H., & Schroeder, M. D. "The Protection of Information in Computer Systems." _Proceedings of the IEEE 63_, 9 (September 1975): 1278-1308. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a166b32372291f70-c5a1fcf9-4c9347d4-a834bc6e-47713863de2098c118908a56"><ac:parameter ac:name="">SCG 07</ac:parameter></ac:structured-macro> \[SCG 2007\] Secure Coding Guidelines for the Java Programming Language, version 2.0, Sun Microsystems, Inc. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7019feff586cb46c-8b28a87e-4f0f46a5-9516ac9f-196ae718cfcb7f51cd0909ad"><ac:parameter ac:name="">SCG 09</ac:parameter></ac:structured-macro> \[SCG 2009\] [Secure Coding Guidelines for the Java Programming Language, version 3.0|http://java.sun.com/security/seccodeguide.html], Sun Microsystems, Inc. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="c58b72774884a158-45b7c29f-49f641db-9931b405-ae31c873d15d6be90063a629"><ac:parameter ac:name="">Schildt 07</ac:parameter></ac:structured-macro> \[Schildt 2007\] Herb Schildt's Java Programming Cookbook, Herb Schildt, McGraw-Hill (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="cea2e21fe10d9c08-b9525dc0-40e54df5-9a989515-67b7e9aab82f4b7c874e0ed4"><ac:parameter ac:name="">Schneier 00</ac:parameter></ac:structured-macro> \[Schneier 2000\] Secrets and Lies---Digital Security in a Networked World , by Bruce Schneier. ISBN 0-471-25311-1, John Wiley and Sons. (2000) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bd82472b2e6c1072-760ca956-45ab4c32-9eb3a1c8-296153ba1041ea9fbbeb8449"><ac:parameter ac:name="">Schoenefeld 04</ac:parameter></ac:structured-macro> \[Schoenefeld 2004\] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com), Nov 2004. (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2ad206f6c2fba9cf-78820c43-44614ee9-b149abe0-47f1f4f7a9db28bb7d61499b"><ac:parameter ac:name="">Schwarz 04</ac:parameter></ac:structured-macro> \[Schwarz 2004\] [Avoiding Checked Exceptions|http://www.oreillynet.com/onjava/blog/2004/09/avoiding_checked_exceptions.html], by Don Schwarz, ONJava (2004) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="63419befb27bee99-20502de0-4a744d8a-9dedaae0-74086faa5711ed9eee726758"><ac:parameter ac:name="">Schweisguth 03</ac:parameter></ac:structured-macro> \[Schweisguth 2003\] [Java Tip 134: When catching exceptions, don't cast your net too wide|http://www.javaworld.com/javaworld/javatips/jw-javatip134.html?page=2], by Dave Schweisguth. Javaworld.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="20c876ac57324fe8-2b63504e-41b74144-bac68956-cef49fb915da6cfddf82645d"><ac:parameter ac:name="">SDN 08</ac:parameter></ac:structured-macro> \[SDN 2008\] [SUN Developer Network|http://developers.sun.com/], Sun Microsystems, Inc. (1994-2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="241621ff1ff4780e-207640cd-43bd433b-91ba88f1-2be851de0676ccae4d3effc0"><ac:parameter ac:name="">Seacord 05</ac:parameter></ac:structured-macro> \[Seacord 2005\] Seacord, Robert C. _Secure Coding in C and C+\+_. Boston, MA: Addison-Wesley. (2005) See [http://www.cert.org/books/secure-coding] for news and errata. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7b44740877c65136-2e69d56a-45e54602-a3298aa1-5fc002f7ee690fb215ba7a94"><ac:parameter ac:name="">SecArch 06</ac:parameter></ac:structured-macro> \[SecArch 2006\] [Java 2 Platform Security Architecture|http://java.sun.com/javase/6/docs/technotes/guides/security/spec/security-spec.doc.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="0034b234fa5b2429-402223f9-43644ec6-9477878b-ba1e41e49c7bb0d3744402c2"><ac:parameter ac:name="">Security 06</ac:parameter></ac:structured-macro> \[Security 2006\] [Java Security Guides|http://java.sun.com/javase/6/docs/technotes/guides/security/], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="af94da44bc13230c-b9af1c72-423a432b-b597907f-3086cac00e199c90465e19d2"><ac:parameter ac:name="">SecuritySpec 08</ac:parameter></ac:structured-macro> \[SecuritySpec 2008\] [http://java.sun.com/j2se/1.5.0/docs/guide/security/spec/security-specTOC.fm.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="438b8fc74959bf4c-9999d35f-4d5a4258-b646bc21-edd79bfbc617c1b3c56aed71"><ac:parameter ac:name="">Sen 07</ac:parameter></ac:structured-macro> \[Sen 2007\] [Avoid the dangers of XPath injection|http://www.ibm.com/developerworks/xml/library/x-xpathinjection.html], by Robi Sen, IBM developerWorks. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="65bdc07318ac51e8-015dbfb8-47244129-9407b914-eb82c8a44e3741ff26e2c773"><ac:parameter ac:name="">Steel 05</ac:parameter></ac:structured-macro> \[Steel 2005\] Core Security Patterns: Best Practices and Strategies for J2EEâ¢, Web Services, and Identity Management, by Christopher Steel, Ramesh Nagappan and Ray Lai. Prentice Hall PTR / Sun Microsystems, Inc. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="84ffd7771d193dfd-ddb0b583-433e493a-bfa4811f-a927cdd424072c1a01bc165e"><ac:parameter ac:name="">Steele 1977</ac:parameter></ac:structured-macro> \[Steele 1977\] Steele, G. L. "[Arithmetic shifting considered harmful|http://doi.acm.org/10.1145/956641.956647]." _SIGPLAN Not._ 12, 11 (November 1977), 61-69. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="6dcaf505aaaebb69-699d3096-47d64c78-a6da9f7b-ba4ec2c1fe64487636b2d555"><ac:parameter ac:name="">Steinberg 05</ac:parameter></ac:structured-macro> \[Steinberg 2005\] [Java Developer Connection Tech Tips "Using the Varargs Language Feature"|http://java.sun.com/developer/JDCTechTips/2005/tt0104.html], Daniel H. Steinberg, January 4, 2005. (2005) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d40e6624a61b2c81-c3eed535-4cd64ec9-841789f7-57f5a8d578f1f8593db43dbd"><ac:parameter ac:name="">Sterbenz 06</ac:parameter></ac:structured-macro> \[Sterbenz 2006\] [Secure Coding Antipatterns: Avoiding Vulnerabilities|http://gceclub.sun.com.cn/java_one_online/2006/TS-1238/TS-1238.pdf], by Andreas Sterbenz and Charlie Lai, Sun Microsystems. JavaOne Conference. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="47b11cfd8a6b8e82-23c049d3-42ae4391-9dcbb6a0-06350eea6537fa4b65eee760"><ac:parameter ac:name="">Steuck 02</ac:parameter></ac:structured-macro> \[Steuck 2002\] [XXE (Xml eXternal Entity) attack|http://www.securityfocus.com/archive/1/297714], by Gregory Steuck (www.securityfocus.com). (2002) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="5cd4aa779525492e-ce87e149-492e4e7f-a21f8c12-26c8180c3bcb7a47758a588b"><ac:parameter ac:name="">Sun 04</ac:parameter></ac:structured-macro> \[Sun 1999\] [Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated?|http://java.sun.com/j2se/1.4.2/docs/guide/misc/threadPrimitiveDeprecation.html], Sun Microsystems, Inc. (1999) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="85245fc2c1147fe1-5e3649dc-457c47c5-87849f5b-ce670f854cb3c09b224dcb89"><ac:parameter ac:name="">Sun 03</ac:parameter></ac:structured-macro> \[Sun 2003\] [Sun ONE Application Server 7 Performance Tuning Guide|http://docs.sun.com/source/817-2180-10/], Sun Microsystems, Inc. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="783ffb2d4ff71e31-802c0d51-4f12485e-ad62b645-602d3a9a9607a4b505545815"><ac:parameter ac:name="">Sun 06</ac:parameter></ac:structured-macro> \[Sun 2006\] [Java⢠Platform, Standard Edition 6 documentation|http://java.sun.com/javase/6/docs/index.html], Sun Microsystems, Inc. (2006) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="fa2fb6d069a72f59-e56abb43-45454c93-8b27ba06-d8c772b8dbc0570ee82abc46"><ac:parameter ac:name="">Sun 08</ac:parameter></ac:structured-macro> \[Sun 2008\] [Java⢠Plug-in and Applet Architecture|http://java.sun.com/javase/6/docs/technotes/guides/jweb/applet/applet_execution.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="76a1672350583366-66a6defc-47f94c43-a70eaa4d-d2f68f20ed3898a73540c7b0"><ac:parameter ac:name="">Sutherland 10</ac:parameter></ac:structured-macro> \[Sutherland 2010\] [Composable thread coloring|http://portal.acm.org/citation.cfm?doid=1693453.1693485], by Dean F. Sutherland and William L. Scherlis. Principles and Practice of Parallel Programming, Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming. (2010) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="a4839b8889aaed81-3e7fcc8c-4b844b8d-b49d9217-63744cad76cc88913c68dbdd"><ac:parameter ac:name=""> Tanenbaum 03</ac:parameter></ac:structured-macro> \[Tanenbaum 2003\] Andrew S. Tanenbaum, Maarten Van Steen. [Distributed Systems: Principles and Paradigms, 2/E|http://www.pearsonhighered.com/educator/academic/product/0,,0132392275,00%2ben-USS_01DBC.html]. March, 2003. ISBN-10: 0132392275. |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="7ce232866162c4af-3f719e06-480a4cf5-9b1c81c1-fd70cf24fbcc17041c795ee4"><ac:parameter ac:name="">Techtalk 07</ac:parameter></ac:structured-macro> \[Techtalk 2007\] [The PhantomReference Menace. Attack of the Clone. Revenge of the Shift.|http://developers.sun.com/learning/javaoneonline/2007/pdf/TS-2707.pdf], by Josh Bloch and William Pugh, JavaOne Conference. (2007) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="bedc2e3a0ed0f445-36d41acd-405f4132-8210a4b5-9ff90aab87d777909344fb97"><ac:parameter ac:name="">Tomcat 09</ac:parameter></ac:structured-macro> \[Tomcat 2009\] Tomcat documentation, [Changelog|http://tomcat.apache.org/tomcat-6.0-doc/changelog.html] and [Security fixes|http://tomcat.apache.org/security-6.html], the Apache Software Foundation. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="dc5d563a6902e112-4b95f760-424c4685-b5219443-04b803cde20c17fc4c32061c"><ac:parameter ac:name="">Tools 11</ac:parameter></ac:structured-macro> \[Tools 2011\] [JDK Tools and Utilities Specification|http://download.oracle.com/javase/7/docs/technotes/tools/index.html], Oracle Inc. (2011) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="d15abf7d232eb246-0bc85ae5-41f04e1b-95c5bb02-2fe8b562421390de5f535f48"><ac:parameter ac:name="">Tutorials 08</ac:parameter></ac:structured-macro> \[Tutorials 2008\] [The Java Tutorials|http://java.sun.com/docs/books/tutorial/index.html], Sun Microsystems, Inc. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="253b9404118bb67a-ac85fe0e-4e5644a8-82dabd55-49fcce79fbd4ed25985083ad"><ac:parameter ac:name="">Unicode 09</ac:parameter></ac:structured-macro> \[Unicode 2009\] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by: [_The Unicode Standard, Version 5.2_|http://www.unicode.org/versions/Unicode5.2.0/], Mountain View, CA: The Unicode Consortium. ISBN 978-1-936213-00-9. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="abbada3a54e4ac1e-68358c59-46ce4d09-bbe8a3bc-dd02a75db934873fb53174cc"><ac:parameter ac:name="">Venners 97</ac:parameter></ac:structured-macro> \[Venners 1997\] [Security and the class loader architecture|http://www.javaworld.com/javaworld/jw-09-1997/jw-09-hood.html?page=1] Java World.com, by Bill Venners. (1997) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="4b259a494950a1b5-9e7319d5-4b524035-baaabfc8-70ada9ca79b416aade4d4de8"><ac:parameter ac:name="">Venners 03</ac:parameter></ac:structured-macro> \[Venners 2003\] [Failure and Exceptions, A Conversation with James Gosling, Part II|http://www.artima.com/intv/solid.html], by Bill Venners. Artima.com. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="416ea4d27c1af530-1d18adae-4c4b44ee-ad68bbd1-8a2a0cb7d6cab158905e350e"><ac:parameter ac:name="">W3C 08</ac:parameter></ac:structured-macro> \[W3C 2008\] [Extensible Markup Language (XML) 1.0 (Fifth Edition)|http://www.w3.org/TR/REC-xml/#include-if-valid], W3C Recommendation, by Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler and François Yergeau. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="35332c0578206c0e-3068d215-445b48e1-97a2a75b-94c90c47774d85155242508d"><ac:parameter ac:name="">Ware 08</ac:parameter></ac:structured-macro> \[Ware 2008\] [Writing Secure Java Code:A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools|http://mikeware.us/thesis/], Michael S. Ware. (2008) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="612f25bed575443b-50732ef3-4c1e4ece-8098b40c-085008ef12e64ad6befec8ea"><ac:parameter ac:name="">Weber 09</ac:parameter></ac:structured-macro> \[Weber 2009\] [Exploiting Unicode-enabled Software|http://www.lookout.net/wp-content/uploads/2009/03/chris_weber_exploiting-unicode-enabled-software-v15.pdf], by Chris Weber, Casaba Security. CanSecWest March 2009. (2009) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="56bcea94fe388c44-2250cae0-44054fa1-83509fa1-d82890607b2bad7f8bee1271"><ac:parameter ac:name="">Wheeler 03</ac:parameter></ac:structured-macro> \[Wheeler 2003\] [Secure Programming for Linux and Unix HOWTO|http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/index.html], David A. Wheeler. (2003) |
Wiki Markup |
---|
<ac:structured-macro ac:name="anchor" ac:schema-version="1" ac:macro-id="2b6a7df003554453-5f6b00ed-441f4806-9354b653-ec34182a677b0e6e19724859"><ac:parameter ac:name="">Zukowski 04</ac:parameter></ac:structured-macro> \[Zukowski 2004\] [Java Developer Connection Tech Tips "Creating Custom Security Permissions"|http://java.sun.com/developer/JDCTechTips/2004/tt0518.html#2], John Zukowski, May 18, 2004. (2004) |